NIS2 compliance audit

A comprehensive assessment of your organisation’s readiness to meet the requirements of the NIS2 Directive and the National Cybersecurity System Act.

The NIS2 Directive applies to key and important entities operating in sectors critical to the functioning of the state and the economy.

What is NIS2?

Who does it apply to?

Entities that achieve a certain scale of activity (in principle: medium and large enterprises — 50 employees or €10 million in turnover/balance sheet for the previous year) and provide services whose disruption would have a significant impact on security, health, the economy or public order.

Supply chain

NIS2 also applies to entities that supply services or products to key or important entities. The main criterion for coverage is significance for the continuity of critical services or being part of the supply chain.

When does it take effect in Poland?

NIS2 is included in the Act on the National Cybersecurity System (KSC). The act has been signed by the President (as of February 2026). Vacatio legis: 14 days from the date of publication in the Journal of Laws. Start of provisions: expected in March 2026.

Adjustment periods

Parliament has extended the adjustment periods: 6 months for registration, 12 months for implementation, and introduced a 2-year moratorium on penalties.


Key and important entities

The sector and role in the economy matter more than the legal form. Polish branches of corporations in regulated industries must comply with the Polish KSC/NIS2 Act.

Key entities — Critical areas

Energy
Transport
Banking
Financial Market Infrastructure
Healthcare
Drinking Water
Wastewater
Digital Infrastructure
ICT Service Management
Public Administration
Outer Space

Important entities

Postal & Courier Services
Waste Management
Chemical Industry
Food Production
Manufacturing & Technology
Digital Services
Scientific Research

Board responsibility and sanctions

Obligations and responsibility rest with the management / board of the entity — including financial responsibility.

Board responsibility

/

Direct oversight: The board is responsible for implementing and ensuring the effectiveness of cybersecurity measures.

/

Formal obligations: Approval of IT policies, risk analysis and mandatory training for management.

/

Personal risk: Possibility of imposing financial penalties directly on managers for gross negligence.

Sanctions

/

Financial penalties: Up to €10 million or 2% of global turnover (for key entities).

/

Authority powers: Ability to impose orders, prohibitions and conduct ad-hoc audits.

/

Business consequences: Civil liability towards contractors and risk of reputational damage and supply chain contract loss.


Risk management measures

The NIS2 Directive requires the implementation of comprehensive cybersecurity risk management measures.

01

IT security policy and risk analysis

Development and implementation of an IT security policy and methods, procedures and tools for assessing and managing cyber risk, e.g. in accordance with ISO/IEC 27005.

02

IT incident handling

A set of actions and procedures for responding to security incidents — from detection to reporting and remediation. Reporting incidents to CSIRT within 24 hours.

03

Business continuity and crisis management

Business Continuity Plan (BCP) and IT Disaster Recovery Plan (DRP). Daily backups, test restore from backup.

04

Supply chain security

Managing risk arising from the use of subcontractor and IT supplier services. Supplier security audits, certificates (e.g. ISO 27001).

05

Network and IT systems security

Security throughout the entire lifecycle of IT systems — procurement, development, updating, maintenance, decommissioning. “Security by Design”.

06

Assessment of risk management effectiveness

Internal and external audits, penetration tests, benchmarking against standards (ISO 27001, CIS Benchmark). Reporting to management.

07

Cyber hygiene and training

Strong passwords and MFA, cybersecurity training, phishing simulations, principle of least privilege, awareness campaigns.

08

Cryptography and encryption

Encryption of data at rest (BitLocker) and in transit (TLS 1.3, VPN). Cryptographic key management (KMS). Digital signatures and PKI.

09

Human resources security, access control and asset management

Multi-factor authentication (MFA), RBAC, IT asset inventory, data classification, asset lifecycle monitoring, DLP.


NIS2 compliance audit methodology

Our audit covers four key stages — from planning to delivering a report with recommendations for corrective actions.

1

Audit planning

  • Establishing the scope and audit criteria (NIS2 + KSC)
  • Identification of areas subject to assessment
  • Preparation of the work plan
2

Conducting the audit

  • Review of documentation and procedures
  • Interviews with key personnel
  • Analysis of processes and operational practices
  • Sample verification of selected system configurations and security mechanisms (e.g. firewall, IAM systems, backup, network segmentation)
  • Collection and evaluation of audit evidence
3

Gap analysis

  • Comparison of current state with NIS2/KSC requirements
  • Identification of gaps
  • Assessment of the significance of identified non-conformities
4

Reporting

  • Report with findings
  • Recommendations for corrective actions
  • Framework implementation schedule
  • Presentation of results to management

Get in Touch

We will help your organisation prepare for NIS2 requirements.

Start a conversation →

Our experts

Claus Frank

Claus Frank

Managing Partner, getsix Group

E-mail

Linkedin

Quick Facts

Get in touch

Each of the individual and independent member firms of HLB Poland have a dedicated HLB Contact Partners.

Start the conversation
Get in touch